SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

quiz-placeholder

Similar activities

Mitigation Techniques and Controls

Mitigation Techniques and Controls

Professional Development

10 Qs

Roblox

Roblox

Professional Development

10 Qs

CHRISTMAS MOVIES!!!!!!

CHRISTMAS MOVIES!!!!!!

KG - Professional Development

16 Qs

Python

Python

University - Professional Development

10 Qs

Tedx Quizmanina

Tedx Quizmanina

Professional Development

15 Qs

SEM with SmartPLS

SEM with SmartPLS

University - Professional Development

10 Qs

Demo Assignment #1 - Computer Basics - Bridge to Dist. Ed

Demo Assignment #1 - Computer Basics - Bridge to Dist. Ed

Professional Development

15 Qs

CatalogONE Workshop - Day 1 Morning

CatalogONE Workshop - Day 1 Morning

Professional Development

10 Qs

SOF Day 1 Review

SOF Day 1 Review

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Justin Bauguess

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are some of the costs associated with a data breach? (Select more than one answer.)

Fines

Re-Training Employees

Reputation Damage

Nothing - Data Breaches don't cost anything

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some signs a security operations organization is at ServiceNow's "Maturity Level 2"? (Multiple answers)

Automated querying of internal and supplier environments

Prioritization by impact

KPIs, Reporting, and SLAs

Noise Reduction

Easily handle common attacks to improve response closure

Answer explanation

Automated querying of internal and supplier environments is part of level 5 Easily handle common attacks to improve response closure is part of level 4.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: It is better to add roles directly to a user rather than adding roles to a group and then users to the group.

True

False

Answer explanation

Adding roles to the group then users to that group prevents a user from keeping a role they should not have.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Security Incident?

sn_sec_si

sn_sec_cmn

sn_vul

sn_si

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Vulnerability Response?

sn_sec_vul

sn_vul

sn_si

sn_sec_cmn

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features from Security Support Common (but can be used for other purposes)?

There are multiple answers.

Enrichment Data Mapping

Email Parsing

Escalations

Workflow Triggers

Filter Groups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Vulnerable Items can only be part of one Remediation Task (Vulnerability Group).

True

False

Answer explanation

Vulnerable Items and Remediation Tasks (Vulnerability Groups) are related in the sn_vul_m2m_vul_group_item table.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?